Welcome to Notes Time πŸ‘‹

Notes Time is your trusted platform for free study notes, tutorials, and guides designed to make learning simple, clear, and effective.

Whether you’re exploring Full Stack Web Development, mastering Cyber Security, or diving into Digital Marketing β€” we’ve got you covered with easy-to-understand content and practical examples.

Learn smarter, grow faster, and upskill with Notes Time β€” your digital study companion for tech and career success.

Subscribe to our newsletter and get our newest updates right on your inbox.

Active Directory Domain Services – Setup Windows Server Conceptual

By Himanshu Shekhar Β· 18 Mar 2026

Active Directory Domain Services – Setup Windows Server Conceptual

πŸ› οΈ Step-by-Step: Setting Up an Active Directory Domain Services (AD DS) Server

⚠️ Educational & Authorized Use Only
This guide is intended for system administrators, students, and security professionals deploying Active Directory in authorized environments.

βœ… Prerequisites Before Installing AD DS

  • βœ” Windows Server (2016 / 2019 / 2022 / 2025)
  • βœ” Static IP address configured
  • βœ” Updated system & security patches
  • βœ” Correct system time & timezone
  • βœ” Sufficient disk space (NTDS & SYSVOL)
πŸ’‘ Domain Controllers should never use DHCP IPs.

⬇️ How to Download Windows Server ISO (2016 / 2019 / 2022 / 2025)

Before installing Active Directory Domain Services, you must obtain a legitimate Windows Server ISO image. Microsoft provides official evaluation ISOs suitable for learning, lab environments, and enterprise testing.

πŸ’‘ Evaluation editions are fully functional for 180 days and can later be converted to licensed versions without reinstallation.

πŸ…ΎοΈ Option 1: Download via Microsoft Evaluation Center

πŸ’‘ This option is useful if you want to explore all available Microsoft server evaluations.

πŸ…ΎοΈ Option 2: Direct Official ISO Download Links

⚑ This option is faster if you already know the exact version you need.

πŸ“¦ Recommended Editions for AD DS Labs

  • βœ” Windows Server Standard (Desktop Experience)
  • βœ” Windows Server Datacenter (Desktop Experience)
⚠️ Important:
Always choose Desktop Experience (GUI) when learning Active Directory Domain Services. Server Core is recommended only for advanced administrators.

πŸ–₯️ Installing Windows Server Using VMware (Complete Lab Setup)

VMware allows you to safely deploy Active Directory inside an isolated lab environment without affecting your physical system.

πŸ”Ή Step 1: Install VMware Workstation

  • βœ” Download VMware Workstation Player or Pro
  • βœ” Supported on Windows & Linux
  • βœ” Install with default settings
πŸ’‘ VMware Player is sufficient for AD labs. VMware Pro adds snapshots & advanced networking.

πŸ”Ή Step 2: Create New Virtual Machine

  • Open VMware Workstation
  • Click Create a New Virtual Machine
  • Select Typical (Recommended) β†’ Next
  • Choose I will install the operating system later
  • Guest OS: Microsoft Windows
  • Version: Windows Server 2016
  • VM Name: WIN2016
  • Disk Size: 60 GB
  • Select Split disk into multiple files
  • Click Finish

πŸ”Ή Step 2.1: Virtual Hardware Configuration (Recommended)

Component Recommended Value
CPU 2 vCPUs (Minimum)
Memory 4–8 GB RAM
Disk 80–100 GB (Single disk)
Network NAT (Default) or Host-Only
⚠️ Avoid Bridged networking unless required. NAT or Host-Only is safer for AD labs.

πŸ”Ή Step 3: Attach Windows Server ISO

  • Select VM β†’ Edit virtual machine settings
  • Click CD/DVD (SATA)
  • Enable Connect at power on
  • Select Use ISO image file
  • Browse & select Windows Server 2016 ISO
  • Click OK

πŸ”Ή Step 4: Start Windows Installation

  • Click Power on this virtual machine
  • Windows Setup loads automatically
  • Select Language, Time & Keyboard
  • Click Install Now

πŸ”Ή Step 5: Select Windows Server Edition

  • Select Windows Server 2016 Standard Evaluation (Desktop Experience)
  • Desktop Experience provides GUI required for AD labs
  • Click Next

πŸ”Ή Step 6: Select Installation Type

  • Choose Custom: Install Windows only (advanced)
  • Click Next

πŸ”Ή Step 7: Disk Selection

  • Select Drive 0 Unallocated Space
  • Click Next

πŸ”Ή Step 8: Configure Administrator Password

  • System installs & reboots automatically
  • Enter strong Administrator password
  • Re-enter password β†’ Finish
Strong password is mandatory for Domain Controller promotion.

πŸ”Ή Step 9: Login to Server

  • Click inside VM window
  • VM β†’ Send Ctrl + Alt + Del
  • Login as Administrator
πŸ’‘ Before installing AD DS, ensure the server has a static IPv4 address configured and DNS points to itself (127.0.0.1 or server IP).

πŸ”Ή Step 10: Server Manager Dashboard

  • Server Manager opens automatically
  • Click Add roles and features

πŸ”Ή Step 11: Add Roles & Features Wizard

  • Review Before you begin
  • Click Next
  • Select Role-based or feature-based installation
  • Click Next
  • Select Local Server
  • Click Next

πŸ”Ή Step 11.1: Take Snapshot Before AD DS Installation

  • Power off the virtual machine
  • Create a VMware snapshot
  • Name it Pre-AD DS Install
  • Ensures safe rollback if promotion fails
🚨 Never promote a Domain Controller without a snapshot.

πŸ”Ή Step 12: Install Active Directory Domain Services (AD DS)

  • Check Active Directory Domain Services
  • Click Add Features
  • Click Next through Features
  • Click Install
Always take a VM snapshot before promoting Domain Controller.

πŸ”Ή Step 13: Promote to Domain Controller

  • Click Promote this server to a domain controller
  • Select Add a new forest
  • Root domain name: NotesTime.local
  • Forest & Domain level: Windows Server 2016
  • Ensure DNS Server & Global Catalog checked
  • Enter DSRM password
  • Leave DNS delegation unchecked
  • NetBIOS name: NOTESTIME
  • Keep default database & SYSVOL paths
  • Run Prerequisites Check
  • Click Install

πŸ”Ή Step 14: Automatic Reboot

  • Server displays You're about to be signed out
  • System reboots automatically
  • Domain Controller promotion completes

πŸ”Ή Step 15: Login as Domain Administrator

  • Press Ctrl + Alt + Del
  • Login as NOTESTIME\Administrator

πŸ”Ή Step 16: Verify Active Directory Tools

  • Open Start Menu
  • Navigate to Windows Administrative Tools
  • Confirm availability of:
  • βœ” Active Directory Users and Computers
  • βœ” Active Directory Domains and Trusts
  • βœ” Active Directory Sites and Services
  • βœ” DNS Manager

πŸ—οΈ Managing Active Directory Objects (OU, Users, Groups & Computers)

Active Directory organizes resources using logical objects. Understanding how to create and manage these objects is essential for administration, security, and Group Policy enforcement.

πŸ“‚ Organizational Unit (OU)

An Organizational Unit (OU) is a container used to organize users, groups, computers, and other OUs within a domain. OUs are primarily used for delegation and Group Policy application.

  • βœ” Logical organization of AD objects
  • βœ” Enables Group Policy targeting
  • βœ” Supports administrative delegation
πŸ› οΈ How to Create an OU
  1. Open Active Directory Users and Computers
  2. Right-click the domain (NotesTime.local)
  3. Select New β†’ Organizational Unit
  4. Enter OU name (e.g. IT, HR)
  5. Click OK

πŸ‘€ User Object

A User object represents an individual identity used to log in, access resources, and receive permissions within the domain.

  • βœ” Used for authentication
  • βœ” Assigned permissions via groups
  • βœ” Controlled by Group Policies
πŸ› οΈ How to Create a User
  1. Open Active Directory Users and Computers
  2. Navigate to desired OU
  3. Right-click β†’ New β†’ User
  4. Enter name, username (e.g. jdoe)
  5. Set password and account options
  6. Click Finish
πŸ—‘οΈ How to Delete a User

Deleting a user permanently removes the account from Active Directory. This action should be performed carefully, especially in production environments.

  • ⚠️ Ensure the user account is no longer required
  • ⚠️ Disable the account first (recommended best practice)
  • ⚠️ Confirm no critical services depend on the account
πŸ› οΈ Step-by-Step: Delete a User Account
  1. Open Active Directory Users and Computers
  2. Navigate to the appropriate Organizational Unit (OU)
  3. Locate the user account (e.g. jdoe)
  4. Right-click the user β†’ Select Delete
  5. Click Yes to confirm deletion
⚠️ Deleted users can be restored only if Active Directory Recycle Bin is enabled.
πŸ” Recommended Enterprise Practice
  • βœ” Step 1: Disable the account
  • βœ” Step 2: Remove from all security groups
  • βœ” Step 3: Wait 30–90 days (grace period)
  • βœ” Step 4: Then permanently delete
πŸ’‘ In enterprise environments, immediate deletion is discouraged. Account disablement provides auditing and rollback capability.

🏒 Managing Multiple Users in an OU & Assigning an Administrator

An Organizational Unit (OU) can contain multiple user accounts. You can assign administrative privileges to a specific user either at the domain level or only for a specific OU.


πŸ‘₯ Example Scenario
  • OU Name: IT
  • Users inside OU: Rahul, Priya, Amit
  • Requirement: Assign Rahul as IT Administrator

πŸ”Ή Method 1: Assign Domain Administrator (Full Control – Not Recommended for OU Only)
  1. Open Active Directory Users and Computers
  2. Navigate to Users container
  3. Double-click Domain Admins group
  4. Click Add
  5. Add user (e.g. Rahul)
  6. Click OK
🚨 This gives full domain administrative privileges. Use only if absolutely required.

πŸ”Ή Method 2: Delegate Control on Specific OU (Recommended Enterprise Method)

This method gives administrative control only over a specific OU, not the entire domain.

  1. Right-click the OU (e.g. IT)
  2. Select Delegate Control
  3. Click Next
  4. Click Add β†’ Select user (e.g. Rahul)
  5. Click Next
  6. Choose task:
    • Create, delete, and manage user accounts
    • Reset user passwords
    • Modify group membership
  7. Click Next β†’ Finish
βœ… Rahul now has administrative control only within the IT OU. He cannot manage other OUs or the entire domain.

πŸ” Enterprise Best Practice
  • βœ” Never assign users directly to Domain Admins unless necessary
  • βœ” Use OU-level delegation instead
  • βœ” Follow Least Privilege Principle
  • βœ” Use separate admin accounts (e.g. rahul.admin)
πŸ’‘ Large organizations use Role-Based Access Control (RBAC) and delegate administration per department.

πŸ‘₯ Group Object

A Group object is used to assign permissions to multiple users or computers at once. This simplifies access management.

  • βœ” Centralized permission management
  • βœ” Users added to groups inherit access
  • βœ” Reduces administrative overhead
πŸ› οΈ How to Create a Group
  1. Right-click desired OU
  2. Select New β†’ Group
  3. Enter group name (e.g. IT-Admins)
  4. Group scope: Global
  5. Group type: Security
  6. Click OK
πŸ’‘ Best practice: Assign permissions to groups, not individual users.

πŸ’» Computer Object

A Computer object represents a machine that is joined to the Active Directory domain.

  • βœ” Represents domain-joined systems
  • βœ” Receives computer-based Group Policies
  • βœ” Used for access control and auditing
πŸ› οΈ How to Create a Computer Object
  1. Open Active Directory Users and Computers
  2. Right-click desired OU
  3. Select New β†’ Computer
  4. Enter computer name (e.g. WIN10-CLIENT)
  5. Click OK
⚠️ Computer objects are also created automatically when a machine joins the domain.

βœ… Best Practices for AD Object Management

  • βœ” Use OUs instead of default containers
  • βœ” Separate users, computers, and servers
  • βœ” Use groups for permissions (AGDLP model)
  • βœ” Apply GPOs at OU level

πŸ›‘οΈ How to Create a Group Policy (GPO) – Step by Step

Group Policy allows administrators to centrally manage user and computer settings across the domain. GPOs are usually linked to an Organizational Unit (OU).

πŸ’‘ Best Practice: Always link GPOs to OUs β€” not directly to the domain β€” unless required.

πŸ”Ή Example Scenario
  • OU Name: IT
  • Requirement: Disable Control Panel for IT users

πŸ› οΈ Step 1: Open Group Policy Management
  1. Click Start
  2. Open Server Manager
  3. Go to Tools
  4. Select Group Policy Management

πŸ› οΈ Step 2: Create New GPO
  1. Expand your domain (e.g. NotesTime.local)
  2. Right-click the target OU (e.g. IT)
  3. Select Create a GPO in this domain, and Link it here
  4. Enter GPO Name (e.g. IT-ControlPanel-Restriction)
  5. Click OK

πŸ› οΈ Step 3: Edit the GPO
  1. Right-click the newly created GPO
  2. Select Edit
  3. Navigate to:
    User Configuration β†’ Administrative Templates β†’ Control Panel
  4. Double-click Prohibit access to Control Panel and PC settings
  5. Select Enabled
  6. Click Apply β†’ OK

πŸ› οΈ Step 4: Apply & Verify Policy
  1. Login to a user inside IT OU
  2. Open Command Prompt
  3. Run command: gpupdate /force
  4. Test if Control Panel access is restricted
βœ… The Group Policy is now active for users inside the IT OU.

πŸ” Enterprise Best Practices for GPO
  • βœ” Never edit Default Domain Policy unless necessary
  • βœ” Use descriptive naming for GPOs
  • βœ” Test GPOs in lab before production
  • βœ” Avoid linking too many GPOs to one OU
  • βœ” Document every policy change
⚠️ Misconfigured Group Policy can lock out users or break systems. Always test before deployment.

πŸ’» How to Add (Join) a Computer to Active Directory – Real-World Enterprise Steps

In real enterprise environments, computers are joined to the domain to enable centralized authentication, Group Policy enforcement, security control, and auditing.

πŸ’‘ When a computer joins the domain, a Computer Object is automatically created in Active Directory.

πŸ”Ή Real-World Scenario
  • Domain Name: NotesTime.local
  • Client OS: Windows 10 / Windows 11
  • OU Target: Workstations
  • IT Admin performing domain join

πŸ› οΈ Step 1: Pre-Join Requirements (Very Important)
  • βœ” Client must use Domain Controller DNS IP
  • βœ” Network connectivity to Domain Controller
  • βœ” Correct date & time (Kerberos requirement)
  • βœ” Domain credentials (Domain Admin or delegated account)
⚠️ If DNS is incorrect, domain join will fail. Client must point to the Domain Controller as DNS server.

πŸ› οΈ Step 2: Configure DNS on Client Machine
  1. Open Network Settings
  2. Go to Adapter Options
  3. Right-click β†’ Properties
  4. Select Internet Protocol Version 4 (TCP/IPv4)
  5. Set Preferred DNS to Domain Controller IP (e.g. 192.168.1.10)
  6. Click OK

πŸ› οΈ Step 3: Join Computer to Domain
  1. Right-click This PC β†’ Select Properties
  2. Click Advanced system settings
  3. Under Computer Name tab β†’ Click Change
  4. Select Domain
  5. Enter domain name: NotesTime.local
  6. Click OK
  7. Enter Domain Admin credentials
  8. Click OK
βœ… Welcome to the NotesTime.local domain.

πŸ› οΈ Step 4: Restart Computer
  • System will prompt for restart
  • Click Restart Now

πŸ› οΈ Step 5: Login Using Domain Account
  1. Press Ctrl + Alt + Del
  2. Click Other User
  3. Login using: NOTESTIME\username

πŸ› οΈ Step 6: Move Computer to Correct OU (Important in Enterprise)
  1. Open Active Directory Users and Computers
  2. Locate computer in Computers container
  3. Right-click β†’ Move
  4. Select appropriate OU (e.g. Workstations)
  5. Click OK
πŸ’‘ In enterprise environments, computers should never remain in the default "Computers" container.

πŸ” Real-World Enterprise Best Practices
  • βœ” Use delegated accounts for domain join
  • βœ” Use naming standards (e.g. HR-WS-001)
  • βœ” Join computers directly into correct OU (via PowerShell or imaging tools)
  • βœ” Apply baseline security GPO immediately
  • βœ” Monitor domain join events in Event Viewer
⚠️ Unauthorized domain join can expose enterprise network risks. Always restrict who can join machines to the domain.

πŸ§ͺ AD Lab Best Practices (Professional)

  • βœ” Windows Server Installed
  • βœ” Active Directory Domain Services Installed
  • βœ” Domain Controller Promoted
  • βœ” DNS Configured Automatically
  • βœ” AD Administrative Tools Available
πŸ’‘ A well-designed lab closely mirrors real enterprise AD environments.

🏁 Final Enterprise Takeaways

  • βœ” AD DS setup defines enterprise security posture
  • βœ” DNS, Kerberos, and time sync are critical
  • βœ” Misconfiguration is the primary risk
  • βœ” Hardening must follow installation immediately
  • βœ” Continuous monitoring is mandatory
βœ… A well-designed Active Directory dramatically reduces breach impact and recovery time.

πŸ“š

πŸ“š Related Blogs

TryHackMe BLOG Room – Full Walkthrough

By Himanshu Shekhar Β· 18 Mar 2026

πŸ§ͺ TryHackMe – BLOG Room (Full Lab Walkthrough)...

+